AWS Deployment

This Deployment Guide provides step-by-step instructions for deploying MetaDefender Storage Security on Amazon Web Services (AWS) infrastructure.

This guide is intended for IT infrastructure architects, administrators, and DevOps professionals seeking to prevent malicious traffic from entering their AWS Cloud environment. It outlines how MetaDefender Core enhances threat prevention by inspecting uploaded productivity files and identifying known vulnerabilities in running services, applications, and unpatched operating systems deployed within AWS.

MetaDefender is provided in the following formats:

Currently, there are no restrictions on the AWS regions where MetaDefender can be deployed, with the exception that MetaDefender is not available in AWS GovCloud at this time.

For installing our solution, please review the guidelines listed below to deploy the different infrastructure needed to install the product:

Database Configuration

MetaDefender Storage Security currently supports AWS RDS, an AWS-managed service compatible with PostgreSQL.

EC2 Key Management

An EC2 key pair is used exclusively for SSH or RDP access to an EC2 instance, a scenario typically reserved for debugging.

You can either create a new key pair or use an existing one.

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard